Wechat Qwen Reply
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill contains hardcoded absolute file paths to a specific user's directory (C:\Users\chenxun), which is a significant privacy and portability concern. It utilizes PowerShell with a 'Bypass' execution policy to capture screenshots of WeChat conversations and transmits this data to an external API (dashscope.aliyuncs.com). While these actions align with the stated purpose of chat recognition, the combination of environment-specific hardcoding and automated screen capture of private communications in scripts like qwen_vl_read.py warrants a suspicious classification.
